Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kun-Won Jang is active.

Publication


Featured researches published by Kun-Won Jang.


Journal of Information Processing Systems | 2010

A Study on Design and Implementation of the Ubiquitous Computing Environment-based Dynamic Smart On/Off-line Learner Tracking System

Hyung-Min Lim; Kun-Won Jang; Byung-Gi Kim

In order to provide a tailored education for learners within the ubiquitous environment, it is critical to undertake an analysis of the learning activities of learners. For this purpose, SCORM (Sharable Contents Object Reference Model), IMS LD (Instructional Management System Learning Design) and other standards provide learning design support functions, such as, progress checks. However, in order to apply these types of standards, contents packaging is required, and due to the complicated standard dimensions, the facilitation level is lower than the work volume when developing the contents and this requires additional work when revision becomes necessary. In addition, since the learning results are managed by the server there is the problem of the OS being unable to save data when the network is cut off. In this study, a system is realized to manage the actions of learners through the event interception of a web-browser by using event hooking. Through this technique, all HTML- based contents can be facilitated again without additional work and saving and analysis of learning results are available to improve the problems following the application of standards. Furthermore, the ubiquitous learning environment can be supported by tracking down learning results when the network is cut off.


international conference on hybrid information technology | 2006

Design of Secure Dynamic Clustering Algorithm using SNEP and μTESLA in Sensor network

Kun-Won Jang; Sang-Hun Lee; Moon-Seog Jun

Contrary to general network, sensor network has many restrictions such as energy recharge. Accordingly, security mechanism used to general network cannot be applied to sensor network. Many researchers propose method of security and energy efficiency separately. To maximize energy efficiency, the methods to support data aggregation and clusterhead selection algorithm are proposed. To strengthen the security, the methods to support encryption techniques and manage a secret key that is applicable to sensor network are proposed. However, energy and security issues are trade-off. This paper is devoted to design secure routing protocol combining conventional routing protocol with security protocol. This new protocol is that encryption algorithm and key management method are applied to specific routing protocol.


international conference on next generation web services practices | 2005

M-commerce model by enhanced location privacy protocol in GSM

Mi-Og Park; Yeonhee Choi; Kun-Won Jang

Today, e-commerce transactions continue to impact the global business environment profoundly and its technologies and applications are beginning to focus more on mobile computing and the wireless Web. As the usage of mobile devices becomes pervasive and convenient, the e-commerce through mobile devices is an emerging field. However, most of e-commerce systems do not only support privacy rights for user but also the rights for the merchant provider. A collection and processing of personal data may lead to private and family life violation, thus discouraging the public against the usage of new technologies. In this paper, we propose the enhanced-privacy m-commerce schemes, which are based on the e-commerce model using the GSM user authentication protocol.


The Kips Transactions:partc | 2007

Design of the Covered Address Generation using the Super Increasing Sequence in Wireless Networks

Jun-Ho Choun; Sung-Chan Kim; Kun-Won Jang; Kyung-Hwa Do; Moon-Seog Jun

The General security method of wireless network provides a confidentiality of communication contents based on the cryptographic stability against a malicious host. However, this method exposes the logical and physical addresses of both sender and receiver, so transmission volume and identification of both may be exposed although concealing that content. Covered address scheme that this paper proposes generates an address to which knapsack problem using super increasing sequence is applied, and replaces the addresses of sender and receiver with addresses from super increasing sequence. Also, proposed method changes frequently secret addresses, so a malicious user cannot watch a target system or try to attack the specific host. Proposed method also changes continuously a host address that attacker takes aim at. Accordingly, an attacker who tries to use DDoS attack cannot decide the specific target system.


international conference on hybrid information technology | 2006

Implementation of New Active Service to Support Ubiquitous Card for U-City

Sang-Hun Lee; Mi-Og Park; Kun-Won Jang; Moon-Seog Jun

This system proposes ubiquitous card service which is to give us the unique personalized information in UCity( Ubiquitous City). The user have to submit the personal information(considered ones intellectual powers, concerns, and age etc.) in U-Card(Secure Smart Card with PKI and RF tag) with secure channel to the information servers, and the user acquired the unique information that is created by system with the user¿s personal information. This system can keep individual information and apply U-Card having public key and certificate to the protection of the invasion of one¿s privacy and support the communication between RFID and Reader. So the system acquires the personalized information then provide services(customized information about the contents) on the base of U-City.


computer and information technology | 2006

Design and Verification of Security API Structure Based on PKCS #11

Kun-Won Jang; Jun-Ho Choun; Myung-Hee Kim; Moon-Seog Jun

This paper is devoted to design SecurityAPI that solves the disadvantages and restrictions due to several attack types of public key SecurityAPI and provides the security services. SecurityAPI may be applied to both domestic and foreign standard using domestic standard algorithm such as KCDSA and HAS-160 added to conventional PKCS #11. To verify the security of SecurityAPI for protecting key object based on public key, we provide the flow chart of each SecurityAPI function by graphical method using CPN and describe the process of SecurityAPI by sentence. Also, we analyze the CPN model of proposed Security API structure using the place invariant and verify the security of SecurityAPI that we do not need the modification for input data.


system analysis and modeling | 2006

A Study on DRM System for On/Off Line Key Authentication

Kun-Won Jang; Chan-Kil Park; Jung-Jae Kim; Moon-Seog Jun


information security and cryptology | 2007

Analysis of Security Vulnerability on Firewall Logging Mechanism against DDoS Attack

Jun-Ho Choun; Kun-Won Jang; Moon-Seog Jun; Dong-Gyu Shin


Archive | 2006

Design of Secure Clustering Routing Protocol using SNEP and µTESLA on Sensor Network Communication

Kun-Won Jang; Woo-sik Jung; Dong-kyu Shin; Moon-Seog Jun


system analysis and modeling | 2003

The Design of WEB Stegodata Detection Systems Using Intrusion Detection Systems.

Kyoung-Hwa Do; Kun-Won Jang; Sang-Hun Lee; Moon-Seog Jun

Collaboration


Dive into the Kun-Won Jang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yeonhee Choi

Korea Polytechnic University

View shared research outputs
Researchain Logo
Decentralizing Knowledge